Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 104 (0.001 secs)
You searched for: subject:"forensics"
[1] 2 3     Next    Last
[texts]Works in Forensic Medicine - Dr Hitesh Kothari
These are some of my articles submitted in preparation for the Diploma in Forensic Medicine and Ethics that may help you in gaining insight into the world of Forensics.
Keywords: Forensics
Downloads: 217
[movies]AIDE Summer 2011
AIDE Summer 2011 Conference Videos
Keywords: security; forensics
Downloads: 782
[audio]Forensic Science -- Groks Science Show 2005-11-02 - Charles Lee and Frank Ling
Solving a murder often requires analysis from forensic scientists. On this program, Dr. Frederick Zugibe, the former Chief Medical Examiner of Rockland County, discussed the techniques of forensic science.
Keywords: Science; forensics
Downloads: 4,253
[audio]Forensics for IT - ACC 626 Audio Clip
A presentation on basic concepts of Forensics for IT
Keywords: Digital forensics; computer forensics; forensics for IT; tools
Downloads: 28
[audio]Science Of Crime - Peter Griffin
A panel discussion on the science of crime featuring forensic scientist Keith Bedford of ESR Science, criminologist Kim Workman, 3 News reporter Charlotte Shipman and New Zealand Police forensics manager John Walker.
Keywords: forensics; crime; science; criminology
Downloads: 87
[audio]The Secret Life of Documents - Griffin Boyce
Everything you've ever wanted to know about document forensics, but were afraid to ask. Mostly because of that whole "watch list" thing.This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; forensics
Downloads: 30
[movies]AIDE 2012
Videos from AIDE 2012 Videos embedded at http://www.irongeek.com/i.php?page=videos/aid2012/mainlist
Keywords: hacking; security; forensics
Downloads: 1,184
[movies]Computer Forensics & Electronic Discovery
Computer Forensics & Electronic Discovery Andy Cobb, PhD http://ac-forensics.com/ http://issa-kentuckiana.org http://irongeek.com
Keywords: Computer; Forensics; Electronic Discovery
Downloads: 1,256
[texts]PoC || GTFO 00 - Rt. Revd. Pastor Manul Laphroaig
This is the very first issue of PoC || GTFOCopied below is the descriptions of the articles in this issue.In Section 2, Travis Goodspeed will show you how to build your own antiforensics hard disk out of aniPod by simple patching of the open source Rockbox firmware. The result is a USB disk, which still playsmusic, but which will also self destruct if forensically imaged.In Section 3, Julian Bangert and Sergey Bratus provide some nifty tricks for abusing the differences inELF dialect between exe...
Keywords: poc; pdf; security; forensics
Downloads: 84
[movies]Elijah Ltd Computer Forensic & E Discovery Experts
Elijah capable to process the electronic data, offer to an assortment of commercially accessible review platforms with our e discovery processing services. We are there to respond clearly and promptly. For any further info, get in touch with us today.
Keywords: Computer Forensics Chicago; Computer Forensics Services; eDiscovery processing; data processing
Downloads: 12
[movies]AIDE 2013 Hackers In Unganda A Documentary ( Kickstarer Project) Oncee
AIDE 2013
Keywords: security; hacking; forensics; west virgina
Downloads: 144
[movies]Fire Investigator - Ian Woolf
Kate Grimwood is a PhD student researching the chemical forensics of fire in the Science faculty at the University of Technology, Sydney. She spoke to Shannon Jones about her research into flashover and toxic fumes
Keywords: science; UTS; SCEP; fire; forensics
Downloads: 113
[unknown]Wiki - Forensics Wiki
Forensics Wiki dumped with WikiTeam tools.
Keywords: wiki; wikiteam; MediaWiki; Forensics Wiki; forensicswikiorg; unknowncopyright
[movies]Elijah Ltd Computer Forensic Judgment
Learn about the excellent e discovery data processing service which entails safely processing of E data – spreadsheets, word processing documents and other files. To stay updated for latest offers, subscribe to our newsletter today.
Keywords: eDiscovery processing; Computer Forensics Services; Computer Investigations
Downloads: 6
[texts]Overview of Existing Methods of Spam Mining and Potential Usefulness of Sender’s Name as Parameter for Fuzzy String Matching
This paper gives an overview and analyzes the different existing anti spamming techniques both content based, non content based methods and a combination of the duo. It also suggests that a small change in one of the parameters in the fuzzy string matching method could be useful to produce better results.
Keywords: email; spam; computer forensics; fuzzy string match
Downloads: 33
[texts]Analysis of dc offset in iOS devices for use in audio forensic examination - Fuller, Daniel Bradley
Due to the physical properties of electronic components, DC offset will occur to some extent in all audio recordings. DC offset is the effect of direct current on an audio recording, and causes the audio signal to no longer oscillate around the absolute zero quantization level. The mean amplitude of a recording is calculated to determine the global amount of DC offset. Measuring the offset, its change over time, and its standard deviation can be used during forensic examination to aid in determi...
Keywords: DC offset; iOS; media forensics; recording arts
Downloads: 84
[audio]Aids to Forensic Medicine and Toxicology - W.G. Aitchison Robertson
LibriVox recording of Aids to Forensic Medicine and Toxicology, by W.G. Aitchison Robertson. A 1922 source-book for British criminal pathologists, this will be of particular interest to fans of popular police forensics television shows, films, and murder mysteries.(Summary by BellonaTimes For further information, including links to online text, reader information, RSS feeds, CD cover or other formats (if available), please go to the LibriVox catalog page for this recording...
Keywords: Forensics; criminology; pathology; toxicology; science; Librivox; audiobook
Downloads: 16,028
[texts]U.S. Navy Medicine Vol. 67 No. 1 January 1976 - U.S. Navy. Bureau of Medicine and Surgery
U.S. Navy Medicine Vol. 67 No. 1 January 1976FROM THE CHIEF ................... . . 2THE SURGEON GENERAL'S 7TH ANNUALSPECIALTIES ADVISORY CONFERENCEAND COMMITTEES' MEETINGProgram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3First Plenary Session, 9 September 1975Administrative Announcements . . . . . . . . . . . 4CAPT W.M. McDermott, Jr., MC, USNWelcoming Remarks . . . . . . . . . . ...
Keywords: Navy Medicine magazine; diving accidents; forensics; dentistry
Downloads: 64
[audio]Kate Grimwood interview - Ian Woolf
Kate Grimwood is a PhD student researching the chemical forensics of fire in the Science faculty at the University of Technology, Sydney. She spoke to Ian Woolf about her research into flashover and toxic fumes.
Keywords: science; scep; fire; forensics; flashover; fumes
Downloads: 4,547
[texts]Frequency Analysis for Art Forensics - Jash GUO

Keywords: art restoration; art; art forensics; art conservation
Downloads: 76
[audio]Q&A with Stephanie Lester - Show #14
Interview with Steve Burgess of Burgess Consulting & Forensics about how to retrieve lost data from your computer, and all the interesting ways in which data can be accidentally (or intentionally!) deleted from a computer...
Keywords: computer; data; Q&A; stephanie lester; steve burgess; computer forensics; forensics; questions; interview
Downloads: 19
[software]CAINE 5.0 "BLACKHOLE" 64 bit - Nanni Bassetti
URL: http://www.caine-live.net/CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics Currently the project manager is Nanni Bassetti.CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface.The main design objectives that CAINE aims to guarantee are the following:an interoperable environment that supports the d...
Keywords: CAINE; Computer Aided INvestigative Environment; ubuntu; linux; distro; CF; DF; digital forensics; computer forensics
Downloads: 4,568
[movies]Christopher Ward IT Stanford Who's Who Certified
http://www.christopherward.me/christopher-ward-it-stanford-whos-who-certified.html - Christopher is the CEO of Viper Global Limited, a security and training consultancy offering clients across Australasia, Oceania and Canada, a comprehensive range of services that encompass incident response, digital forensics, security and risk management.
Keywords: training; consulting; incident response; digital forensics; risk management
Downloads: 3
[audio]Yoma 30a Refuting A Husband's Paternity - Yitzhak
Refuting a husband's paternity via the establishment of his sterility, his absence from his wife's locale, and forensic testing.
Keywords: paternity; forensics; testing; bastardy; mamzerus; sterility; halachah; even haezer
Downloads: 3
[audio]Esther McKay - ex Forensic Detective
Captain Pat interviews Esther McKay, former Senior Constable who specialised in forensics in the NSW Police in Australia. Esther campaigns and helps former and current police suffering from PSD. She is the voice for many who remain silent.
Keywords: esther mckay captain pat crime forensics police australia
Downloads: 43
[unknown]Wiki - Digital Forensics Framework
Digital Forensics Framework dumped with WikiTeam tools.
Keywords: wiki; wikiteam; MediaWiki; Digital Forensics Framework; wikidigital_forensicorg
Downloads: 2
[movies]Who Was Lee Harvey Oswald?
FRONTLINE marks the fiftieth anniversary of the Kennedy assassination with a two-hour reprise of its investigative biography of the man at the center of the political crime of the 20th century. At the heart of the assassination lies the puzzle of Lee Harvey Oswald: Was he the emotionally disturbed lone gunman of the 1964 Warren Commission report? Was he, as the House Select Committee on Assassinations concluded, probably part of a conspiracy on that day in Dallas? Or was he an unwitting fall guy...
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 11
[movies]Green Screen Fun with Ed Primeau - Primeau Productions
http://www.PrimeauProductions.com Ed Primeau teaches us about the power of green screens in this clip produced by Primeau Productions. Green screens and alternate backgrounds can add alot of value to your video for your company today. Give us a call for more information! 248-853-4091
Keywords: green; screen; fun; with; ed; primeau; productions; video; audio; forensics
Downloads: 30
[movies]HITB 2004 Security Conference - The Grugq - The Art of Defiling: Defeating Forensic Analysis on Unix File Systems
The Grugq The Art of Defiling: Defeating Forensic Analysis on Unix File Systems (presentation material in zip)
Keywords: hack; security; forensics; data hiding; file systems; unix; conference
Downloads: 1,026
[movies]HITB 2003 Security Conference - Wong Chun Meng - The Value of Computer Forensics
Wong Chun Meng - The Value of Computer Forensics Incident Response (IR) Handling is a hot topic among many organizations these days. Many IT managers in this part of the region are beginning to realize the inevitability of their critical mission systems being compromised. It's a matter of time. Computer forensics is a component of IR whereby it involves an investigation process to determine what has occurred when a system was compromised...
Keywords: hac; security; forensics; vulnerabilites; security conference; security professional
Downloads: 207
[movies]Four Days In November
From more than eight million feet of newsreels, amateur footage, tape-recordings and more, David L. Wolper presents a priceless detailed account of the time and events surrounding the assassination of President John F. Kennedy. 1964
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 14
[movies]JFK Inside The Target Car
Documentary-makers employ modern forensic techniques to prove that the only bullets fired during the assassination of President John F. Kennedy came from the Texas School Book Depository, thereby confirming the lone gunman theory.
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 13
[movies]JFK Death In Dealey Plaza
On November 22, 1963, an obscure businessman - Abraham Zapruder - took his 8mm camera to a local park and shot a 26-second home movie. That film, capturing the assassination of President Kennedy, is arguably the most important film of the 20th Century. But did you know there were a dozen other photographers who trained their cameras on the Presidential motorcade? Join the Unsolved History team as they piece together those stills and flickering images to form a complete picture of the tragic even...
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 19
[movies]On Trial: Lee Harvey Oswald
Among the most heinous criminal acts ever committed on American soil is the assassination of United States President John F. Kennedy on November 22, 1963. When accused gunman Lee Harvey Oswald was himself shot to death two days later while in police custody, Americans were denied hard answers to a brutal and bewildering mystery. ON TRIAL: LEE HARVEY OSWALD recalls all of the surviving witnesses to determine the guilt or innocence of the man believed to have murdered JFK...
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination; Spence; Bugliosi
Downloads: 16
[movies]The Kennedy Assassination - Beyond Conspiracy
Forty years after President John F. Kennedy was fatally shot on November 22, 1963, over 70 percent of Americans still believe there was a conspiracy to kill him and that the suspected assasin, Lee Harvey Oswald did not act alone. utilizing modern technology, computer animator Dale Myers created a digital simulation of the only known film of the murder, a 16 mm home movie taken by Abraham Zapruder, a bystander that filmed the fatal shots...
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 31
[movies]Oswald's Ghost
In Oswald's Ghost, acclaimed director Robert Stone offers an unprecedented deconstruction of the assassination of President John F. Kennedy, uncovering how this single event forever changed the face of American culture and why it continues to plague the nation's psyche. The 90-minute film features interviews with authors Norman Mailer and Edward J. Epstein, politician Gary Hart, news anchor Dan Rather, activist Tom Hayden, attorney Mark Lane, and others...
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 22
[movies]Lee Harvey Oswald 48 Hours To Live
This program seeks to explain the enigmatic Oswald using a brand new approach. No other documentary has exclusively traced Oswald's actions in the minutes, hours and days following the events in Dallas. By shifting the focus on that November weekend, we're able to tell a familiar story in an unfamiliar way, providing a refreshing new perspective on Oswald himself, as well as on the Kennedy assassination...
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 22
[movies]Cold Case JFK
Fifty years later, what can science tell us about the Kennedy assassination—and the investigations that followed? The 1963 murder, in broad daylight in front of hundreds of witnesses, might seem to be a homicide investigator’s best-case scenario. Yet somehow the JFK assassination became a forensic nightmare, plagued by a controversial autopsy and, incredibly, a prime suspect murdered on live television while in police custody, before he could be tried...
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 27
[texts]The Secret KGB JFK Assassination Files (1998)
This program examines and exposes the theories posited by the KGB about one of the most momentous events of the Cold War, the assassination of John F. Kennedy. Included are recently exposed film and document evidences as well as many interviews with the KGB's own JFK experts.
Keywords: JFK; Kennedy; Oswald; Tippit; VonMoss; Conspiracy; Forensics; Assassination
Downloads: 13
[audio]The Eye of Osiris - R. Austin Freeman
Librivox recording of The Eye of Osiris by R. Austin Freeman. Read by J. M. Smallheer. The Eye of Osiris is an early example from the Dr. Thorndyke series of detective stories written by R. Austin Freeman. In these stories, the author drew on his extensive medical and scientific knowledge for his main character, a medico-legal expert who relies on forensic evidence and logical deduction in solving cases...
Keywords: librivox; audiobooks; mystery; Dr. Thorndyke; detective stories; Egyptology; forensics
Downloads: 27,218 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(5 reviews)
[texts]Computer Forensics Overview - John Daniele, President and CEO, Technical Security & Intelligence Inc.
Powerpoint overview of the Computer Forensics process, in addition to the laws that pertain to electronic evidence.
Keywords: computer forensics; forensics; investigation; data analysis; data recovery; information security; risk management; electronic evidence; evidence; search and seizure; encase
Downloads: 755
[movies]OHM2013: Guy Martin - Real time network forensics using pom-ng
Networks are part of our daily life. A lot of information transit through them but few really know what is actually transmitted and what information can be extracted. This talk will present pom-ng, a network forensic tool that performs real time analysis. The talk will focus on describing the coding challenges faced with such tool, architecture and what can be done with it. The talk will be split in 3 parts...
Keywords: OHM2013; talk; Guy Martin; lua; pom-ng; real time; network forensics; forensics; IP; de-fragmentation; TCP; TCP re-ordering; DNS caching; DNS
Downloads: 8
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 4 Browser Identification - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 526
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 11 Forensic Database Analysis - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 507
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 8 Web Browser Privacy Modes - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 433
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 12 Forensic Log Analysis - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 464
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 6 Shell & Cloud Accounts - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 471
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 9 Email Origin Obfuscation - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 457
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 7 Anonymizers - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 487
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 3 IP Geolocation - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 594
[1] 2 3     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies
audio
texts
web
software